메뉴 건너뛰기




Volumn , Issue , 2005, Pages 25-50

Private Matching

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84891471665     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/0-387-24006-3_3     Document Type: Chapter
Times cited : (30)

References (19)
  • 3
    • 84879524288 scopus 로고    scopus 로고
    • Informationtheoretic private information retrieval: A unified construction
    • [Beimel and Ishai, 20011
    • [Beimel and Ishai, 20011 Beimel, Amos and Ishai, Yuval(2001). Informationtheoretic private information retrieval: A unified construction. Lecture Notes in Computer Science, 2076.
    • (2001) Lecture Notes in Computer Science , vol.2076
    • Beimel, A.1    Ishai, Y.2
  • 5
    • 17444370055 scopus 로고    scopus 로고
    • Public key encryption with keyword search
    • [Bonch and Franklin, 20041
    • [Bonch and Franklin, 20041 Boneh, D. and Franklin, M. (2004). Public key encryption with keyword search. In Eurocrypt 2004, LNCS 3027, 56-73.
    • (2004) Eurocrypt 2004, LNCS 3027 , pp. 56-73
    • Boneh, D.1    Franklin, M.2
  • 6
    • 0001090406 scopus 로고    scopus 로고
    • Computationally private information retrieval with polylogarithmic communication
    • [Cachin et al., 19991
    • [Cachin et al., 19991 Cachin, Christian, Micali, Silvio, and Stadler, Markus (1999). Computationally private information retrieval with polylogarithmic communication. Lecture Notes in Computer Science, 1 592.
    • (1999) Lecture Notes in Computer Science , vol.1 , pp. 592
    • Cachin, C.1    Micali, S.2    Stadler, M.3
  • 10
    • 0023545076 scopus 로고
    • How to play any mental game
    • Goldreich et al., 19871
    • [Goldreich et al., 19871 Goldreich, O., Micali, S., and Wigderson, A. (1987). How to play any mental game. In Proc. of 19th STOC, pages 21 8-229.
    • (1987) Proc. Of 19th STOC , pp. 218-229
    • Goldreich, O.1    Micali, S.2    Wigderson, A.3
  • 11
    • 0003839182 scopus 로고    scopus 로고
    • [Goldreich, 20021 Final (incomplete) draft, version 1.4.
    • [Goldreich, 20021 Goldreich, Oded (2002). Secure multi-party computation. Final (incomplete) draft, version 1.4.
    • (2002) Secure Multi-Party Computation
    • Goldreich, O.1
  • 12
    • 84883891962 scopus 로고    scopus 로고
    • Enhancing privacy and trust in electronic communities
    • [Huberman et al., 19991
    • [Huberman et al., 19991 Huberman, B. A., Franklin, M., and Hogg, T. (1999). Enhancing privacy and trust in electronic communities. In ACM Conference on Electronic Commerce, pages 78-86.
    • (1999) ACM Conference on Electronic Commerce , pp. 78-86
    • Huberman, B.A.1    Franklin, M.2    Hogg, T.3
  • 13
    • 84944905011 scopus 로고    scopus 로고
    • Homomorphic signature schemes
    • [Johnson et al., 20021
    • [Johnson et al., 20021 Johnson, Robert, Molnar, David, Song, Dawn Xiaodong, and Wagner, David (2002). Homomorphic signature schemes. In CT-RSA, pages 244-262.
    • (2002) CT-RSA , pp. 244-262
    • Johnson, R.1    Molnar, D.2    Song, D.X.3    Wagner, D.4
  • 14
    • 0001190474 scopus 로고
    • The probabilistic communication complexicty of set intersection
    • [Kalyanasundaram and Schnitger 19921
    • [Kalyanasundaram and Schnitger, 19921 Kalyanasundaram, B. and Schnitger, G. (1 992). The probabilistic communication complexicty of set intersection. SIAM J. Discrete Mathematics.
    • (1992) SIAM J. Discrete Mathematics
    • Kalyanasundaram, B.1    Schnitger, G.2
  • 16
    • 84891450833 scopus 로고
    • 19951 [Parliament, Parliament, European Directive 951461EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
    • [Parliament, 19951 Parliament, European (1995). Directive 951461EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data.
    • (1995)
  • 17
    • 0033705124 scopus 로고    scopus 로고
    • Practical techniques for searches on encrypted data
    • [Song et al., 20001
    • [Song et al., 20001 Song, Dawn Xiaodong, Wagner, David, and Perrig, Adrian (2000). Practical techniques for searches on encrypted data. In IEEE Symposium on Security and Privacy, pages 44-55.
    • (2000) IEEE Symposium on Security and Privacy , pp. 44-55
    • Song, D.X.1    Wagner, D.2    Perrig, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.